The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 5 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Instructions:Â Complete attached summary review questions and submit as an attachment.
Chapter 19
1. What do most smart cards require the use of, just in case they are
lost or stolen?
A. Token
B. PIN
C. Certificate
D. Ring
Â
2. Hand scanners are examples of what type of security device?
A. Biometric
B. Multifactor
C. Logistical
D. Concatenated
Â
3. Spyware differs from other malware in that it:
A. copies itself to every available host
B. sits dormant for a long period of time
C. works on behalf of a third party
D. all of the above
Â
4. How often should you update your antivirus definitions?
A. Once a year
B. Once a month
C. Once a week
D. Antivirus definitions do not need to be updated.
Â
5. A _____ is different from a virus in that it can reproduce itself, it is
self-contained, and it doesnât need a host application to be
transported.
A. rootkit
B. trojan
C. worm
D. bomb
Â
6. Social ________ is a process in which an attacker attempts to
acquire information about your network and system by social means,
such as talking to people in the organization.
A. networking
B. engineering
C. assailing
D. pinging
Â
Â
7. When an individual follows someone through a physical checkpoint
â such as a door â so closely that they avoid having to authenticate,
this is known as:
A. Tailgating
B. Shoulder surfing
C. Detection avoiding
D. Mantrapping
Â
8. What is the name for a security device that you carry with you that
displays a randomly generated code to use for authentication along
with your PIN?
A. Tracker
B. Ticket
C. Fob
D. Deterrent
Â
9. Administrators should have one account for their routine work and
another for when they need to make system changes. This concept
falls beneath which principle?
A. Common Criteria
B. Least privilege
C. Rules-based administration
D. Open Source Interconnect
Â
10. When the Autorun feature is enabled on a system, which file does it
look for to find actions to execute?
A. COMMAND.COM
B. CONFIG.SYS
C. AUTOEXEC.BAT
D. AUTORUN.INF
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly